Secured distributed algorithms without hardness assumptions
Gespeichert in:
| Titel: | Secured distributed algorithms without hardness assumptions |
|---|---|
| Autoren: | Leonid Barenboim, Harel Levin |
| Weitere Verfasser: | Leonid Barenboim and Harel Levin |
| Quelle: | Journal of Parallel and Distributed Computing. 171:130-140 |
| Publication Status: | Preprint |
| Verlagsinformationen: | Elsevier BV, 2023. |
| Publikationsjahr: | 2023 |
| Schlagwörter: | distributed algorithms, FOS: Computer and information sciences, Computer Science - Distributed, Parallel, and Cluster Computing, generic algorithms, graph coloring, Distributed, Parallel, and Cluster Computing (cs.DC), 0102 computer and information sciences, ddc:004, privacy preserving, multi-party computation, 01 natural sciences |
| Beschreibung: | We study algorithms in the distributed message-passing model that produce secured output, for an input graph $G$. Specifically, each vertex computes its part in the output, the entire output is correct, but each vertex cannot discover the output of other vertices, with a certain probability. This is motivated by high-performance processors that are embedded nowadays in a large variety of devices. In such situations, it no longer makes sense, and in many cases it is not feasible, to leave the whole processing task to a single computer or even a group of central computers. As the extensive research in the distributed algorithms field yielded efficient decentralized algorithms for many classic problems, the discussion about the security of distributed algorithms was somewhat neglected. Nevertheless, many protocols and algorithms were devised in the research area of secure multi-party computation problem (MPC or SMC). However, the notions and terminology of these protocols are quite different than in classic distributed algorithms. As a consequence, the focus in those protocols was to work for every function $f$ at the expense of increasing the round complexity, or the necessity of several computational assumptions. In this work, we present a novel approach, which rather than turning existing algorithms into secure ones, identifies and develops those algorithms that are inherently secure (which means they do not require any further constructions). This approach yields efficient secure algorithms for various locality problems, such as coloring, network decomposition, forest decomposition, and a variety of additional labeling problems. Remarkably, our approach does not require any hardness assumption, but only a private randomness generator in each vertex. This is in contrast to previously known techniques in this setting that are based on public-key encryption schemes. 26 pages. 1 appendix. Short version of the paper was accepted to OPODIS20 |
| Publikationsart: | Article Conference object |
| Dateibeschreibung: | application/pdf |
| Sprache: | English |
| ISSN: | 0743-7315 |
| DOI: | 10.1016/j.jpdc.2022.09.012 |
| DOI: | 10.48550/arxiv.2011.07863 |
| DOI: | 10.4230/lipics.opodis.2020.32 |
| Zugangs-URL: | http://arxiv.org/abs/2011.07863 https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.OPODIS.2020.32 |
| Rights: | Elsevier TDM CC BY |
| Dokumentencode: | edsair.doi.dedup.....c24056dd0c01d17f59524a25c81fd20c |
| Datenbank: | OpenAIRE |
| Abstract: | We study algorithms in the distributed message-passing model that produce secured output, for an input graph $G$. Specifically, each vertex computes its part in the output, the entire output is correct, but each vertex cannot discover the output of other vertices, with a certain probability. This is motivated by high-performance processors that are embedded nowadays in a large variety of devices. In such situations, it no longer makes sense, and in many cases it is not feasible, to leave the whole processing task to a single computer or even a group of central computers. As the extensive research in the distributed algorithms field yielded efficient decentralized algorithms for many classic problems, the discussion about the security of distributed algorithms was somewhat neglected. Nevertheless, many protocols and algorithms were devised in the research area of secure multi-party computation problem (MPC or SMC). However, the notions and terminology of these protocols are quite different than in classic distributed algorithms. As a consequence, the focus in those protocols was to work for every function $f$ at the expense of increasing the round complexity, or the necessity of several computational assumptions. In this work, we present a novel approach, which rather than turning existing algorithms into secure ones, identifies and develops those algorithms that are inherently secure (which means they do not require any further constructions). This approach yields efficient secure algorithms for various locality problems, such as coloring, network decomposition, forest decomposition, and a variety of additional labeling problems. Remarkably, our approach does not require any hardness assumption, but only a private randomness generator in each vertex. This is in contrast to previously known techniques in this setting that are based on public-key encryption schemes.<br />26 pages. 1 appendix. Short version of the paper was accepted to OPODIS20 |
|---|---|
| ISSN: | 07437315 |
| DOI: | 10.1016/j.jpdc.2022.09.012 |
Full Text Finder
Nájsť tento článok vo Web of Science